参考文献
[ 1 ] Gerpott T J,Thomas S,Weichert M. Characteristics and
Mobile Internet Use Intensity of Consumers with
Different Types of Advanced Handsets:An Exploratory
Empirical Study of iPhone, Android and Other Webenable
Mobile Users in Germany [ J ]. Journal of
Telecommunications Policy,2013,37(4/ 5):357-371.
[ 2 ] Zhou Gefen. Study on Mobile Internet in the Integration
of Tourism Industrial Chain [ C ] / / Proceedings of the
2nd International Conference on Green Communications
and Networks. Berlin,Germany:Springer,2012:59-65.
[ 3 ] 詹益旺,胡斌杰. 基于Android 的车联网车载终端的设
计[J]. 移动通信,2013,37(6):87-90.
[ 4 ] Gargenta M. Learning Android(中文版)[M]. 李亚舟, 任中龙,译. 北京:电子工业出版社,2012.
[ 5 ] 宋 杰,党李成,郭振朝. Android OS 手机平台的安全
机制分析和应用研究[J]. 计算机技术与发展,2010,
20(6):152-155.
[ 6 ] Provos N,Honeyman P. Hide and Seek:An Introduction
to Steganography[J]. IEEE Security and Privacy,2003,
1(3):32-44.
[ 7 ] 李 友,张定会. 基于隐写术的信息隐藏技术[J].
信息技术,2010,(7):119-122.
[ 8 ] 刘红翼,王继军,韦月琼. 一种基于LSB 的数字图像信
息隐藏算法[J]. 计算机科学,2008,35(1):100-102.
[ 9 ] Wang Chao, Zhang Weiming, Liu Jiufen. Fast Matrix
Embedding by Matrix Extending[J]. IEEE Transactions on
Information Forensics and Security,2012,7(1):346-350.
[10] Fridrich J,Goljan M, Soukal D. Higher-order Statistical
Steganalysis of Palette Image [ C ]/ / Proceedings of
Conference on Security,Steganography,and Water-marking
of Multimedia Contents. [S. l. ]:SPIE Press,2003:178-190.
[11] Westfeld A, Pfitzmann A. Attack on Steganographic
System [ C ] / / Proceedings of the 3rd International
Workshop on Information Hiding. London, UK: Springer,2000:61-76.
[12] Yang Xiaoping,Chen Zhihong,Li Fei. Multi-pixel Value
Differencing Steganography Based on Wet Paper Codes[J].
Journal of Optoelectronics Laser,2012,23(10):1965-1970.
[13] Li Wanqi, Che Nian, Ren Jinlin, et al. Histogrampreserving
Steganography Using Maximum Flow
Algorithms[C] / / Proceedings of the 2nd International
Conference on Digital Manufacturing & Automation.
Wuhan,China:[s. n. ],2011:590-593.
编辑 顾逸斐 |